A 3D Mesh Watermarking Based on Improved Vertex Grouping and Piecewise Mapping Function

Size: px
Start display at page:

Download "A 3D Mesh Watermarking Based on Improved Vertex Grouping and Piecewise Mapping Function"

Transcription

1 Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN Ubiquitous International Volume 8, Number 1, January 2017 A 3D Mesh Watermarking Based on Improved Vertex Grouping and Piecewise Mapping Function Song Li, Rongrong Ni ( ) and Yao Zhao Institute of Information Science and Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing Jiaotong University, Beijing , China @bjtu.edu.cn;rrni@bjtu.edu.cn;yzhao@bjtu.edu.cn Received July, 2016; revised August, 2016 Abstract. For the three-dimensional (3D) mesh watermarking, the trade-off between the robustness and transparency has been pursued by researchers. In this paper, a blind watermarking algorithm is proposed to improve the robustness by embedding the stronger watermark while ensuring a good performance in the transparency. In the embedding process, we choose the distance from the vertex to the model center as the eigenvalue. Eigenvalues are divided into the corresponding bins according to the improved vertex grouping method, which enhances the robustness of the watermark in the marginal bins. In the process of adjusting vertices, the proposed algorithm effectively controls the transparency of 3D models by the piecewise mapping function. The experimental results demonstrate that the proposed approach is remarkably robust against common attacks including rotation, translation, uniform scaling, vertex reordering, noise, smoothing, quantization and subdivision. Keywords: 3D mesh watermarking, Blind, Robust, improved vertex grouping, Piecewise mapping function 1. Introduction. With the rapid development of 3D modeling and multimedia technology, more and more artificial 3D works and realistic 3D objects are permanently preserved in the form of digital works. However, these digital works are easy to be illegally copied and tampered for further usages in the transmission process, which makes security and copyright of digital works face severe challenges. 3D mesh digital watermarking technology [1] is the process of embedding the secret information into 3D models to achieve the purpose of copyright protection. Compared with images [2], the amount of research literatures about 3D mesh watermarking technology is still relatively less, which mainly results from two major reasons. Firstly, vertices of 3D mesh models [3] are disordered, which virtually increases the difficulty of the watermark embedding. Secondly, the watermark detection of 3D models becomes extremely hard due to a series of complicated attacks. Although the research for 3D mesh digital watermarking technology is facing a variety of difficulties, lots of excellent algorithms have emerged since the first paper [4] about digital watermarking of 3D models was published in In the initial period of development, Ohbuchi et al. [5] proposed several feasible spatial algorithms including Triangle Similarity Quadruple(TSQ) and Tetrahedral Volume Ratio(TVR) methods. Although the robustness of these algorithms is weak, it is worth mentioning that these algorithms 97

2 98 S. Li, R. R. Ni and Y. Zhao provide a feasible way for the subsequent 3D mesh digital watermarking technology. According to the difference of watermark embedding positions, watermarking algorithms are classified into transform domain algorithms [6]- [8] and spatial domain algorithms [9]- [16]. The former inserts the watermark in the transform domain coefficients, while the latter directly modifies vertex positions to embed the watermark. In transform domain methods, the multiresolution wavelet decomposition [6] and the mesh Laplacian spectral decomposition [7, 8] are applied to the 3D watermarking. However, most of the watermarking algorithms are spatial domain algorithms at present. In spatial domain approaches, vertex norm [12] is used to embed the watermark in the Euclidean distance between the vertex and a reference structure, which is a common strategy. In [12], two classical methods were proposed to embed watermark bits by different histogram mapping functions. The first method changes the mean value of the vertex norm and the second shifts its variance. Later, in order to improve the performance of the transparency, several methods [13, 14] were proposed to obtain the minimal surface distortion by different optimization methods. For the sake of robustness against different attacks, some model surface characteristics such as integral invariant [15] and vertex curvature [16] represent some good properties for the watermark embedding. Obviously, the robustness and transparency of the watermarking algorithm have been the focus of the research in order to satisfy the demand on the copyright protection of 3D models in the actual applications. At the same time, considering the process of the watermark detection without the original model, the blind watermarking has greater advantages in practical applications. Based on the facts above, we propose a robust and blind watermarking algorithm based on improved vertex grouping and piecewise mapping function of 3D models in this paper. In the embedding process, the distance from the vertex to the model center is calculated for every vertex of the model, which is called the eigenvalue. Then an ordered set of eigenvalues is obtained. According to the histogram of ordered eigenvalues, 10% of the total number of vertices are discarded in the histogram on both ends. Next, vertices are separated into corresponding bins on the principle that each bin has the same amount of effective vertices. In each bin, the eigenvalues are normalized to a range of [0,1] and then a bit watermark is embedded in a bin by the piecewise mapping function to adjust the mean of eigenvalues. The rest of this paper is organized as follows. Section 2 explains the proposed method. Experiment results are given in Section 3. Conclusions are included in Section The Proposed Method. In general, the information for 3D mesh models includes vertices, facets and other attributes [17]. A 3D mesh model can be represented as M = (V, F ), where V = {v i R 3 0 i L v 1} represents the set of all vertices of the model, v i = (x i, y i, z i ) denotes cartesian coordinate, L v is the number of vertices, F = {f j N + 0 j L f 1} denotes the set of all triangular facets representing mesh topology, where f j represents a facet and L f is the number of facets in the 3D mesh model. In this paper, the proposed method focuses on improving the robustness of the watermark and guaranteeing the transparency of the model. In this section, the watermark embedding and extracting processes are described in details. The block diagram of watermark embedding and extracting is shown in Fig Watermark Generation. Usually, the embedded watermark information is a stream of binary bits, which consists of 0 and 1. For the sake of simplicity, the binary pseudo random sequence is adopted as the watermark information. The original watermark can be denoted by W o = (w0, o w1, o..., wn 1 o ), where wo i {0, 1}, 0 i N 1. N is the length of the original watermark.

3 A 3D Mesh Watermarking Based on Improved Vertex Grouping and Piecewise Mapping Function 99 (a) (b) Figure 1. The block diagram of watermark embedding (a) and watermark extracting (b) Watermark Embedding Process Calculate and sort eigenvalues. The eigenvalue is the distance from the vertex to the model center. The process of calculating and sorting eigenvalues can be executed in the following steps: (a)calculate the center of the model v = ( x, ȳ, z) by following formulas: x = L v 1 i=0 x i, ȳ = L v 1 i=0 y i, z = L v 1 i=0 z i (1) (b)calculate the eigenvalue ρ i for every vertex of the model. In order to obtain the i th eigenvalue, cartesian coordinate (x i, y i, z i ) of the vertex is transformed to spherical coordinate (ρ i, θ i, ψ i ) by formulas as follows: ρ i = (x i x) 2 + (y i ȳ) 2 + (z i z) 2 θ i = tan 1 (y i ȳ) (x i x) (2) ψ i = cos 1 (z i z) (xi x) 2 + (y i ȳ) 2 + (z i z) 2 where 0 i L v 1, ρ i is the i th eigenvalue. Eigenvalues are used to embed the watermark bits. θ i and ψ i are invariable in the watermark embedding process. These two parameters are used to convert coordinates after the completion of the watermark embedding. (c)all the eigenvalues are sorted in an ascending order. In order to intuitively show the distribution of eigenvalues, eigenvalues are divided into 100 bins. Fig. 2 shows the original model Dragon and the corresponding histogram of normalized eigenvalues. For convenience, eigenvalues are normalized to the range of [0, 1] in the horizontal axis. The vertical axis represents the number of eigenvalues in each bin. The histogram of Dragon roughly obeys the normal distribution Divide eigenvalues into corresponding bins by the improved vertex grouping method. In order to embed the watermark, eigenvalues are assigned to the corresponding bins according to the watermark length N. In [12], eigenvalues are divided into 64 bins and

4 100 S. Li, R. R. Ni and Y. Zhao Figure 2. The original model Dragon and the corresponding histogram of normalized eigenvalues. (a) Bunny (b) Dragon Figure 3. The eigenvalues are divided into 64 bins using the grouping method in [12]. histograms of eigenvalues are showed in Fig. 3. For the convenience of display, eigenvalues are normalized to the range of [0, 1] in the horizontal axis. In the bins with green circle highlighted, the number of vertices in the marginal bins is far less than that of the middle bins, which leads to the weak robustness in the marginal bins compared with the middle bins when a bit watermark is embedded a bin in the histogram. In addition, when the capacity is too large, the bins marked in red on both ends may fail to embed the watermark because the number of vertices in these bins is minimal or empty. In order to solve the above mentioned problems, we propose an improved vertex grouping method which promises the same amount of effective vertices in each bin. Eigenvalues are divided into N bins according to the steps below: (a)get rid of 10% of the total number of vertices in the histogram on both ends. The rest number of vertices is L v, where L v = 0.9L v. (b)the number of vertices in each bin is denoted as M = L v/n. The remainder L v%n vertices are discarded. (c)the m th bin B m is represented as follows: B m = {ρ m,j ρ m,j = ρ i, i = 0.05L v + M m + j} where, 0.05L v + M m i< 0.05L v + M (m + 1) 0 m N 1, 0 i M N 1, 0 j M 1 (3)

5 A 3D Mesh Watermarking Based on Improved Vertex Grouping and Piecewise Mapping Function 101 ρ m,j is the j th eigenvalue of the m th bin. M N is the number of actual used vertices in the watermark embedding process. In the proposed method above, eigenvalues are divided into N bins to possess the same amount of effective vertices in each bin, which improves the robustness of the watermark in the marginal bins. After the vertex grouping process, all the groups for watermark embedding are obtained Normalize eigenvalues in each bin. Eigenvalues in the m th bin are normalized to a range of [0, 1] by the following formula: ρ m,j = ρ m,j ρ min m ρ max ρ min where ρ m,j is the j th normalized eigenvalue in the m th bin, ρ max m and ρ min m eigenvalue and the minimum eigenvalue in the m th bin, respectively. m m (4) are the maximum Embed the watermark using the piecewise mapping function for each bin. To ensure the robustness of the algorithm, one bit watermark is embedded in a bin by adjusting the mean of eigenvalues to satisfy the setting requirements. The m th watermark bit meets the following embedding conditions: { ρm <0.5 α, if wm o = 0 ρ m >0.5 + α, if wm o (5) = 1 ρ m = 1 M M 1 j=0 ρ m,j (6) where ρ m is the mean of eigenvalues in the m th bin, α is the watermark strength. M is the number of vertex in the m th bin. The mapping function Eq. 7 is introduced to adjust the eigenvalues ρ m,j to satisfy the condition of watermark embedding. Y = X k (7) Figure 4. The mapping function Y = X k.

6 102 S. Li, R. R. Ni and Y. Zhao Table 1. The mapping results in the condition of the value k = 2 X Y = X = Y X Table 2. The mapping results in the condition of the value k = 0.5 X Y = X = Y X Fig. 4 shows the mapping function curves with different value k. The different value k has the different influence in the mapping process. When the value k is greater than 1, the mapping value Y is smaller than the original value X. On the contrary, the mapping value Y is larger than the original value X. For example, Table 1 and Table 2 show the mapping results in the condition of the value k = 2 and k = 0.5, respectively. The variable quantity reflects the different degree of modification to the original value X in the mapping process. The larger variable quantity will lead to the larger local distortion of 3D model. However, good transparency requires the smaller amplitude changes of eigenvalues. Based on this observation, the piecewise mapping function is proposed as follows: when w i = 0 : when w i = 1 : ρ m,j = (ρ m,j) k(n) m,j (8) k (n) m,j = 1 + n k (9) 0.002, if ρ m,j [0, 0.3) k = 0.001, if ρ m,j [0.3, 0.9) (10) , if ρ m,j [0.9, 1] k (n) m,j = 1 n k (11) 0.001, if ρ m,j [0, 0.6) k = , if ρ m,j [0.6, 0.8) (12) 0.002, if ρ m,j [0.8, 1] k (n) m,j denotes the mapping parameter of the jth eigenvalue in the m th bin during the n th iteration and k is the step size. In view of the magnitude of eigenvalues, the algorithm adopts different value k to obtain the piecewise mapping function, which will ensure that the eigenvalue is mapped to a controllable range. The initial n is 0 and k (0) m,j is 1. When the watermark bit is 0, ρ m,j can be obtained by Eq. 8 and the mean of eigenvalues ρ m is calculated by Eq. 6. If the embedding conditions in the Eq. 5 are met, a watermark bit is embedded in the bin. Otherwise, n adds 1 and the updated ρ m,j is obtained. With the increase of n, a watermark bit is embedded successfully in the bin once meeting the embedding conditions. After the watermark bit is embedded, the modified eigenvalue is ρ m,j.

7 A 3D Mesh Watermarking Based on Improved Vertex Grouping and Piecewise Mapping Function 103 Table 3. The watermark strength in the experiment α Bunny Dragon Rabbit Venus Cho approach Proposed approach Inversely normalize the eigenvalue and transform coordinates. Upon the completion of the watermark embedding, the inverse normalization process is executed corresponding to the normalization process. The eigenvalues of m th bin are converted to the original range by the following formula: ρ m,j = (ρ m,j) (ρ max m ρ min m ) + ρ min m (13) The last step is that spherical coordinate ( ρ i, θ i, ψ i ) of the vertex is converted to cartesian coordinate (x i, y i, z i). Conversion formula is as follows: x i = ρ i cos θ i sin ψ i + x y i = ρ i sin θ i sin ψ i + ȳ (14) z i = ρ i cos ψ i + z the coordinate (x i, y i, z i) is the cartesian coordinate of the new vertex in the watermarked model Watermark extracting process. The proposed algorithm is a blind watermarking algorithm and the watermark extraction process is relatively simple. Firstly, the eigenvalue is calculated for every vertex of the 3D model and all the eigenvalues are sorted in an ascending order. Secondly, after 10% of the total number of vertices are discarded, vertices are assigned to the corresponding bins by the improved vertex grouping method in each bin. The number of bins is determined by the foregone length of the embedded watermark. Then eigenvalues in each bin are normalized to the range of [0, 1]. In the end, the mean eigenvalue ρ d i of the i th bin is calculated and the watermark bit in the i th bin is obtained by the following formula: { 0, if ρ d wi d i 0.5 = (15) 1, if ρ d i >0.5 where 0 i N 1. So the extracted watermark bits are represented by the following sequence: W d = (w d 0, w d 1,..., w d N 1 ) (16) 3. Experimental Results. In this paper, the proposed algorithm is implemented on a DELL computer with an Intel Core i GHz processor and 8 GB of memory using OpenGL library and Visual Studio In the experiments, the length N of the watermark is 64. Table 3 shows the embedding watermark strength α of the experimental parameter. The proposed algorithm is compared with the algorithm of Cho et al. [12]. The contrasted algorithm has been implemented with the same models using the given parameters The experimental models. We choose the Bunny, Dragon, Rabbit and Venus as experimental models in this section. Experimental models have different number of vertices and facets. Their data information are shown in Table 4 and the experimental models are shown in Fig. 5.

8 104 S. Li, R. R. Ni and Y. Zhao Table 4. The data information of the experimental models Model Bunny Dragon Rabbit Venus Vertices Facets (a) Bunny (b) Dragon (c) Rabbit (d) Venus Figure 5. The original models in the experiment. Table 5. The results of the transparency in the experiment ( 10 ( 3) ) MRMS Bunny Dragon Rabbit Venus Cho approach Proposed approach The evaluation of the transparency. In the experiment, we use maximum root mean square (MRMS) as the evaluation of transparency. The MRMS is calculated using the following formula by Metro [18]. { E(V, V ) = max e f (V, V ) = 1 V V e b (V, V ) = 1 V } e f (V, V ), e b (V, V ) { min V { v V { min v V (17) v v } } dv (18) { v v } } dv (19) Note that e f (V, V ) and e b (V, V ) denote the forward and backward root mean square (rms) errors, respectively. V and V represent the original and watermarked mesh model, respectively. The smaller MRMS value represents the lower distortion of the model. Table 5 shows the experimental results of the transparency under the embedding watermark strength in Table 3. Table 3 and Table 5 show that the MRMS values of our method are smaller than the Cho s method when our method embeds the larger watermark intensity. Therefore, our method have the stronger robustness under the condition of the better transparency The evaluation of the robustness. The robustness of the watermark is measured by the correlation value between the extracted watermark and the original watermark.

9 A 3D Mesh Watermarking Based on Improved Vertex Grouping and Piecewise Mapping Function 105 (a) Noise(0.5%) (b) Quantization(8 bits) (c) Smoothing(50 times) (d) Subdivision(loop) Figure 6. The different attacked Bunny models. Table 6. The robustness results of noise attacks Model Amplitude MRMS Corr (%) Cho Proposed Cho Proposed Bunny Dragon Rabbit Venus The correlation value is defined as follows: Corr = (wi d w d ) (wi o w o ) N 1 i=0 N 1 i=0 (wi d wd ) 2 N 1 i=0 (w o i wo ) 2 (20) where w d is the mean of the extracted watermark bits, wi d is the i th watermark bit of the extracted watermark. In the same way, w o is the mean of the original watermark bits, wi o is the i th watermark bit of the original watermark. The correlation value is on the range of [-1,1]. The greater correlation value shows that the extracted watermark is more similar to the original watermark. In order to evaluate the robustness of the algorithm, the attacked models are obtained with different strengths and attacks using the software which is provided by LIRIS lab [19]. For noise attacks, noise intensities are 0.1%, 0.3% and 0.5%. The parameter λ for smoothing attacks is 0.03 and iterations choose 10, 30 and 50, respectively. The vertex coordinates of the model are quantified by intensities including 9 bits, 8 bits and 7 bits. Three types of subdivision attacks are loop subdivision, midpoint subdivision and sqrt(3) subdivision. Fig. 6 shows the part models of the attacked Bunny.

10 106 S. Li, R. R. Ni and Y. Zhao Table 7. The robustness results of smoothing attacks Model Number of MRMS Corr iterations Cho Proposed Cho Proposed Bunny Dragon Rabbit Venus Table 8. The robustness results of quantization attacks Model Intensity MRMS Corr (bits) Cho Proposed Cho Proposed Bunny Dragon Rabbit Venus The proposed algorithm can completely resist rotation, translation, uniform scaling and vertex reordering attacks. Because the algorithm uses the distance from the vertex to the model center as the eigenvalue. The eigenvalue is the relative value and all the eigenvalues are executed the sorting operation. So the extracted watermark bits and the original watermark bits are exactly same, which means that their correlation value is 1. Table 6, 7, 8, 9 show the robustness and the corresponding transparency after four attacks. It is noticed that our approach has better correlation value than those of Cho in a series of attacks. In addition, because of the increased watermark strength, the robustness for mild noise and smoothing attacks is quite strong so that the correlation value between the extracting watermark and the original watermark is 1. Along with the increase of the attack strength, the accuracy of the extracted watermark has the different degree of reduction under the condition of common attacks. The transparency is evaluated by MRMS value between the original model and the attacked watermarked model. The greater the attack intensity is, the larger the distortion of 3D models is. In terms of the

11 A 3D Mesh Watermarking Based on Improved Vertex Grouping and Piecewise Mapping Function 107 Table 9. The robustness results of subdivision attacks Model Types of MRMS Corr subdivision Cho Proposed Cho Proposed Loop Bunny Midpoint Sqrt(3) Loop Dragon Midpoint Sqrt(3) Loop Rabbit Midpoint Sqrt(3) Loop Venus Midpoint Sqrt(3) transparency, the smaller MRMS value represents the lower distortion of 3D models. Our algorithm has an advantage over Cho s method in the aspect of the transparency. 4. Conclusions. In this paper, we propose a blind and robust 3D watermarking algorithm based on improved vertex grouping and piecewise mapping function to improve the robustness while ensuring a good performance in the transparency. On the one hand, the algorithm reasonably divides eigenvalues into corresponding bins to enhance the robustness of the watermark in the marginal bins by the improved vertex grouping method. On the other hand, the algorithm adjusts the mean of eigenvalues to embed the watermark by the piecewise mapping function, which ensures the low distortion of the model. The experiment results demonstrate that the proposed method is more robust against common attacks compared with the Cho s method. Acknowledgment. This work was supported in part by National NSF of China ( , , ), Beijing Nova Programme Interdisciplinary Cooperation Project, Fundamental Research Funds for the Central Universities (2015JBZ002), the PAPD, the CICAEET, CCF-Tencent Open Research Fund. REFERENCES [1] N. Medimegh, S. Belaid, and N. Werghi, 3D triangular mesh watermarking: a survey, International Conference on Communications, Signal Processing, and Their Applications, Sharjah, United Arab Emirates, [2] X. Ding, Z. M. Lu and F. X. Yu, A robust blind image watermarking scheme based on classified vector quantization, Journal of Information Hiding and Multimedia Signal Processing, vol. 6, no. 1, pp , [3] M. Botsch, M. Pauly, L. Kobbelt, P. Alliez, B. Levy, S. Bischoff, and C. Rossl, Geometric modeling based on polygonal meshes, Proc. ACM SIGGRAPH Course Notes, [4] R. Ohbuchi, H. Masuda, and M. Aono, Watermarking three-dimensional polygonal models, Proceedings of the 5th ACM International Conference on Multimedia, New York, USA, pp , [5] R. Ohbuchi, H. Masuda, and M. Aono, Watermarking three-dimensional polygonal models through geometric and topological modifications, IEEE Journal Selected Areas in Communications,vol. 16, no. 4, pp , 1998.

12 108 S. Li, R. R. Ni and Y. Zhao [6] S. Kanai, H. Date, and T. Kishinami, Digital watermarking for 3D polygons using multiresolution wavelet decomposition, Proceedings of the 6th IFIP WG 5.2 International Workshop on Geometric Modeling: Fundamentals and Applications(GEO)-6, Tokyo, Japan, pp , [7] R. Ohbuchi, A. Mukaiyama, and S. Takeaways, A frequency domain approach to watermarking 3D shapes, Proceedings of Annual Conference of the European Association for Computer Graphics, Saarbrucken, Germany, vol. 21, pp , [8] E. E. Abdallah, A. B. Hamza, and P. Bhattacharya, Watermarking 3D models using spectral mesh compression, Signal Image & Video Processing, vol. 3, no. 4, pp , [9] Z. Q. Yu, H. H. S. Ip, and L. F. Kwok, A robust watermarking scheme for 3D triangular mesh models, Pattern Recognition, vol. 36, no. 11, pp , [10] K. Kim, M. Barni, and H. Z. Tan, Roughness-adaptive 3-D watermarking based on masking effect of surface roughness,ieee Trans. on Information Forensics and Security, vol. 5, no. 4, pp , [11] A. M. Molaei, H. Ebrahimnezhad, and M. H. Sedaaghi, Robust and blind 3D mesh watermarking in spatial domain based on faces categorization and sorting, 3D Research, vol. 7, no. 2, pp. 1-18, [12] J. W. Cho, R. Prost, and H. Y. Jung, An oblivious watermarking for 3-D polygonal meshes using distribution of vertex norms, IEEE Trans. on Signal Processing, vol. 55, no. 1, pp , [13] A. G. Bors, and M. Luo, Optimized 3D watermarking for minimal surface distortion, IEEE Trans. on Image Processing, vol. 22, no. 5, pp , [14] M. M. Soliman, A. E. Hassanien, and H. M. Onsi, A robust 3D mesh watermarking approach using genetic algorithms, Intelligent Systems, pp , [15] Y. P. Wang, and S. M. Hu, A new watermarking method for 3D models based on integral invariants, IEEE Trans. on Visualization and Computer Graphics, vol. 15, no. 2, pp , [16] Y. Z. Zhan, Y. T. Li, X. Y. Wang, and Y. Qian, A blind watermarking algorithm for 3D mesh models based on vertex curvature, Journal of Zhejiang University Science C (Computers & Electronics), vol. 15, no. 5, pp , [17] K. Wang, G. Lavoue, F. Denis, and A. Baskurt, A comprehensive survey on three-dimensional mesh watermarking, IEEE Trans. on Multimedia, vol. 10, no. 8, pp , [18] P. Cignoni, C. Rocchini, and R. Scopigno, Metro: Measuring error on simplified surfaces, Computer Graphics Forum, vol. 17, no. 2, pp , [19] K. Wang, G. Lavoue, F. Denis, A. Baskurt, and X. He, A benchmark for 3D mesh watermarking, Shape Modeling International Conference IEEE Computer Society, vol. 5, pp , 2010.

Enhanced Watermarking Scheme for 3D Mesh Models

Enhanced Watermarking Scheme for 3D Mesh Models Enhanced Watermarking Scheme for 3D Mesh Models Lamiaa Basyoni College of Computing and Information Technology Arab Academy of Science and Technology Cairo, Egypt lamiaa.basyoni@gmail.com H. I. Saleh Radiation

More information

Local patch blind spectral watermarking method for 3D graphics

Local patch blind spectral watermarking method for 3D graphics Local patch blind spectral watermarking method for 3D graphics Ming Luo 1, Kai Wang 2, Adrian G. Bors 1, and Guillaume Lavoué 2 1 Department of Computer Science, University of York, York YO10 5DD, UK 2

More information

Arab Journal of Nuclear Sciences and Applications

Arab Journal of Nuclear Sciences and Applications Arab J. Nucl. Sci. Appl., Vol. 51, 4, 62-71 (2018) Arab Journal of Nuclear Sciences and Applications ISSN 1110-0451 Web site: ajnsa.journals.ekb.eg (ESNSA) Non-Blind Robust 3D Object Watermarking Scheme

More information

A STEGANALYTIC ALGORITHM FOR 3D POLYGONAL MESHES. Department of Computer Science, Yale University

A STEGANALYTIC ALGORITHM FOR 3D POLYGONAL MESHES. Department of Computer Science, Yale University A STEGANALYTIC ALGORITHM FOR 3D POLYGONAL MESHES Ying Yang Ruggero Pintus, Holly Rushmeier Ioannis Ivrissimtzis Department of Computer Science, Yale University CRS4, Italy School of Engineering and Computing

More information

Adaptive Fuzzy Watermarking for 3D Models

Adaptive Fuzzy Watermarking for 3D Models International Conference on Computational Intelligence and Multimedia Applications 2007 Adaptive Fuzzy Watermarking for 3D Models Mukesh Motwani.*, Nikhil Beke +, Abhijit Bhoite +, Pushkar Apte +, Frederick

More information

3-D D Digital Watermarking

3-D D Digital Watermarking CORESA 2007, Montpellier 3-D D Digital Watermarking Adrian G. Bors University of York Computer Science Department YORK Y010 5DD, UK adrian.bors@cs.york.ac.uk 9 November 2007 Outline Overview of 3D watermarking

More information

A Benchmark for 3D Mesh Watermarking

A Benchmark for 3D Mesh Watermarking IEEE INTERNATIONAL CONFERENCE ON SHAPE MODELING AND APPLICATIONS (SMI) 2010 1 A Benchmark for 3D Mesh Watermarking Kai Wang 1, Guillaume Lavoué 1, Florence Denis 2, Atilla Baskurt 1, and Xiyan He 3 1,2

More information

An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms

An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms Jae-Won Cho 1, 2, Rémy Prost 1 and Ho-Youl Jung 2* 1 CREATIS, CNRS #5515, Inserm U630 INSA-UCB Villeurbanne, France

More information

BLIND 3D MODEL WATERMARKING BASED ON MULTI-RESOLUTION REPRESENTATION AND FUZZY LOGIC

BLIND 3D MODEL WATERMARKING BASED ON MULTI-RESOLUTION REPRESENTATION AND FUZZY LOGIC BLIND 3D MODEL WATERMARKING BASED ON MULTI-RESOLUTION REPRESENTATION AND FUZZY LOGIC 1 Prof. Sharvari C. Tamane, 2 Dr. Ratnadeep R. Deshmukh, 1 MGM s Jawaharlal Nehru Engineering College sharvaree73@yahoo.com

More information

A Benchmark for 3D Mesh Watermarking

A Benchmark for 3D Mesh Watermarking 2010 Shape Modeling International Conference A Benchmark for 3D Mesh Watermarking Kai WANG 1, Guillaume Lavoué 1, Florence Denis 2, Atilla Baskurt 1 Université de Lyon, CNRS INSA-Lyon 1 / Université Lyon

More information

142 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007

142 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 142 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms Jae-Won Cho, Rémy Prost, and Ho-Youl Jung

More information

A ROBUST 3D WATERMARKING BASED ON FEATURE REGIONS

A ROBUST 3D WATERMARKING BASED ON FEATURE REGIONS A ROBUST 3D WATERMARKING BASED ON FEATURE REGIONS Saoussen Ben Jabra and Ezzeddine Zagrouba Institut Supérieur d informatique, Abou Raihane Bayrouni, 2080 l Ariana, Tunisia. Saoussen.bj@laposte.net, ezzeddine.zagrouba@fsm.rnu.tn

More information

RECENT advances in 3D acquisition technologies, 3D graphics rendering and geometric modeling have boosted

RECENT advances in 3D acquisition technologies, 3D graphics rendering and geometric modeling have boosted RESEARCH REPORT OF LIRIS 1 Robust and Blind Watermarking of Polygonal Meshes Based on Volume Moments Kai Wang, Guillaume Lavoué, Florence Denis, and Atilla Baskurt Abstract This paper describes a robust

More information

Vertex Shuffling : A Novel Information Hiding on 3D Model

Vertex Shuffling : A Novel Information Hiding on 3D Model Vertex Shuffling : A Novel Information Hiding on 3D Model Cong-Kai Lin, Charlie Irawan Tan, and Wen-Kai Tai Department of Computer Science and Information Engineering, National Dong Hwa University, Taiwan,

More information

A New Watermarking Algorithm for Point Model Using Angle Quantization Index Modulation. Feng Xiaoqing

A New Watermarking Algorithm for Point Model Using Angle Quantization Index Modulation. Feng Xiaoqing 4th National Conference on Electrical, Electronics and Computer Engineering (NCEECE 015) A Ne Watermarking Algorithm for Point Model Using Angle Quantization Index Modulation Feng Xiaoqing Institute of

More information

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a

An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,

More information

A reversible data hiding based on adaptive prediction technique and histogram shifting

A reversible data hiding based on adaptive prediction technique and histogram shifting A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn

More information

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 10, NO. 8, DECEMBER /$ IEEE

IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 10, NO. 8, DECEMBER /$ IEEE IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 10, NO. 8, DECEMBER 2008 1513 A Comprehensive Survey on Three-Dimensional Mesh Watermarking Kai Wang, Guillaume Lavoué, Florence Denis, and Atilla Baskurt Abstract

More information

Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation

Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation Kai Wang 1, Guillaume Lavoué 1, Florence Denis 2, and Atilla Baskurt 1 1 LIRIS, UMR 5205 CNRS, INSA-Lyon, F-69621 Villeurbanne,

More information

Spectral Graph-Theoretic Approach to 3D Mesh Watermarking

Spectral Graph-Theoretic Approach to 3D Mesh Watermarking Spectral Graph-Theoretic Approach to 3D Mesh Watermarking Emad E. Abdallah Department of Computer Science Concordia University, Montreal, Canada ee abdal@cs.concordia.ca A. Ben Hamza and Prabir Bhattacharya

More information

WATERMARKING FOR 3D POLYGONS USING WAVELET TRANSFORM AND MODIFIED TRAVELING SALESMAN PROBLEM

WATERMARKING FOR 3D POLYGONS USING WAVELET TRANSFORM AND MODIFIED TRAVELING SALESMAN PROBLEM Journal of the Operations Research Society of Japan 2009, Vol. 52, No. 4, 402-416 WATERMARKING FOR 3D POLYGONS USING WAVELET TRANSFORM AND MODIFIED TRAVELING SALESMAN PROBLEM Shinichi Murata Yasunari Yoshitomi

More information

Block Mean Value Based Image Perceptual Hashing for Content Identification

Block Mean Value Based Image Perceptual Hashing for Content Identification Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions

More information

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed

More information

Accepted Manuscript. Optimization approach for 3D model watermarking by linear binary programming. Yu-Ping Wang, Shi-Min Hu

Accepted Manuscript. Optimization approach for 3D model watermarking by linear binary programming. Yu-Ping Wang, Shi-Min Hu Accepted Manuscript Optimization approach for 3D model watermarking by linear binary programming Yu-Ping Wang, Shi-Min Hu PII: S0167-8396(10)00024-5 DOI: 10.1016/j.cagd.2010.02.003 Reference: COMAID 1208

More information

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,

More information

Blind watermarking of 3D shapes using localized constraints

Blind watermarking of 3D shapes using localized constraints Blind watermarking of 3D shapes using localized constraints Adrian G. Bors Dept. of Computer Science, University of York, York YO DD, U.K. E-mail: adrian.bors@cs.york.ac.uk Abstract This paper develops

More information

DIGITAL watermarking has been studied over many years

DIGITAL watermarking has been studied over many years IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, VOL. 15, NO. 2, MARCH/APRIL 2009 285 A New Watermarking Method for 3D Models Based on Integral Invariants Yu-Ping Wang and Shi-Min Hu, Member,

More information

Dimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction

Dimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction Journal of Physics: Conference Series PAPER OPEN ACCESS Dimensionality Reduction of Laplacian Embedding for 3D Mesh Reconstruction To cite this article: I Mardhiyah et al 2016 J. Phys.: Conf. Ser. 725

More information

Robust Image Watermarking based on DCT-DWT- SVD Method

Robust Image Watermarking based on DCT-DWT- SVD Method Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete

More information

A Laplacian Based Novel Approach to Efficient Text Localization in Grayscale Images

A Laplacian Based Novel Approach to Efficient Text Localization in Grayscale Images A Laplacian Based Novel Approach to Efficient Text Localization in Grayscale Images Karthik Ram K.V & Mahantesh K Department of Electronics and Communication Engineering, SJB Institute of Technology, Bangalore,

More information

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection

A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection John N. Ellinas Abstract In this paper, a robust watermarking algorithm using the wavelet transform and edge detection is presented. The

More information

Optimized Watermarking Using Swarm-Based Bacterial Foraging

Optimized Watermarking Using Swarm-Based Bacterial Foraging Journal of Information Hiding and Multimedia Signal Processing c 2009 ISSN 2073-4212 Ubiquitous International Volume 1, Number 1, January 2010 Optimized Watermarking Using Swarm-Based Bacterial Foraging

More information

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform

A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform A Robust Hybrid Blind Digital Image System Using Discrete Wavelet Transform and Contourlet Transform Nidal F. Shilbayeh, Belal AbuHaija, Zainab N. Al-Qudsy Abstract In this paper, a hybrid blind digital

More information

Polygonal mesh watermarking using Laplacian coordinates

Polygonal mesh watermarking using Laplacian coordinates Eurographics Symposium on Geometry Processing 1 Olga Sorkine and Bruno Lévy (Guest Editors) Volume 9 (1), Number 5 Polygonal mesh watermarking using Laplacian coordinates Y. Yang and I. Ivrissimtzis School

More information

Parameterization of Triangular Meshes with Virtual Boundaries

Parameterization of Triangular Meshes with Virtual Boundaries Parameterization of Triangular Meshes with Virtual Boundaries Yunjin Lee 1;Λ Hyoung Seok Kim 2;y Seungyong Lee 1;z 1 Department of Computer Science and Engineering Pohang University of Science and Technology

More information

View-dependent fast real-time generating algorithm for large-scale terrain

View-dependent fast real-time generating algorithm for large-scale terrain Procedia Earth and Planetary Science 1 (2009) 1147 Procedia Earth and Planetary Science www.elsevier.com/locate/procedia The 6 th International Conference on Mining Science & Technology View-dependent

More information

An Adaptive Threshold LBP Algorithm for Face Recognition

An Adaptive Threshold LBP Algorithm for Face Recognition An Adaptive Threshold LBP Algorithm for Face Recognition Xiaoping Jiang 1, Chuyu Guo 1,*, Hua Zhang 1, and Chenghua Li 1 1 College of Electronics and Information Engineering, Hubei Key Laboratory of Intelligent

More information

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu

A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD

More information

Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique

Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique ISSC 2013, LYIT Letterkenny, June 20 21 Error-free Authentication Watermarking Based on Prediction-Error-Expansion Reversible Technique Rongrong Ni,H.D.Cheng, Yao Zhao andyuhou Institute of Information

More information

QR Code Watermarking Algorithm based on Wavelet Transform

QR Code Watermarking Algorithm based on Wavelet Transform 2013 13th International Symposium on Communications and Information Technologies (ISCIT) QR Code Watermarking Algorithm based on Wavelet Transform Jantana Panyavaraporn 1, Paramate Horkaew 2, Wannaree

More information

Piecewise Permutation Steganography for 3D Humanoid Mesh Models

Piecewise Permutation Steganography for 3D Humanoid Mesh Models Piecewise Permutation Steganography for 3D Humanoid Mesh Models Hsin-Chih Lin* and Shan-Jhu Lin Department of Information and Learning Technology National University of Tainan Tainan City, Taiwan * hclin@mail.nutn.edu.tw

More information

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme

A Robust Color Image Watermarking Using Maximum Wavelet-Tree Difference Scheme A Robust Color Image Watermarking Using Maximum Wavelet-Tree ifference Scheme Chung-Yen Su 1 and Yen-Lin Chen 1 1 epartment of Applied Electronics Technology, National Taiwan Normal University, Taipei,

More information

Estimating normal vectors and curvatures by centroid weights

Estimating normal vectors and curvatures by centroid weights Computer Aided Geometric Design 21 (2004) 447 458 www.elsevier.com/locate/cagd Estimating normal vectors and curvatures by centroid weights Sheng-Gwo Chen, Jyh-Yang Wu Department of Mathematics, National

More information

A Robust Spectral Approach for Blind Watermarking of Manifold Surfaces

A Robust Spectral Approach for Blind Watermarking of Manifold Surfaces A Robust Spectral Approach for Blind Watermarking of Manifold Surfaces Yang Liu Dept. of Computer Science University of Texas at Dallas Richardson, TX 75080, USA yxl072100@utdallas.edu Balakrishnan Prabhakaran

More information

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based

More information

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients

The Analysis and Detection of Double JPEG2000 Compression Based on Statistical Characterization of DWT Coefficients Available online at www.sciencedirect.com Energy Procedia 17 (2012 ) 623 629 2012 International Conference on Future Electrical Power and Energy Systems The Analysis and Detection of Double JPEG2000 Compression

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS

A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS Xie Li and Wenjun Zhang Institute of Image Communication and Information Processing, Shanghai Jiaotong

More information

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad

More information

Algorithm research of 3D point cloud registration based on iterative closest point 1

Algorithm research of 3D point cloud registration based on iterative closest point 1 Acta Technica 62, No. 3B/2017, 189 196 c 2017 Institute of Thermomechanics CAS, v.v.i. Algorithm research of 3D point cloud registration based on iterative closest point 1 Qian Gao 2, Yujian Wang 2,3,

More information

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function. Filtering -The image shown below has been generated by adding some noise in the form of a cosine function. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y)

More information

Image Classification Using Wavelet Coefficients in Low-pass Bands

Image Classification Using Wavelet Coefficients in Low-pass Bands Proceedings of International Joint Conference on Neural Networks, Orlando, Florida, USA, August -7, 007 Image Classification Using Wavelet Coefficients in Low-pass Bands Weibao Zou, Member, IEEE, and Yan

More information

Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers

Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers A. Salhi, B. Minaoui, M. Fakir, H. Chakib, H. Grimech Faculty of science and Technology Sultan Moulay Slimane

More information

A New Spatial q-log Domain for Image Watermarking

A New Spatial q-log Domain for Image Watermarking 1 Ta Minh Thanh, 2 Pham Thanh Hiep, 3 Ta Minh Tam 1 Department of Network Security, Le Quy Don Technical University, 100 Hoang Quoc Viet, Cau Giay, Hanoi, Vietnam. E-mail: taminhjp@gmail.com 2 Le Quy Don

More information

A Framework to Reversible Data Hiding Using Histogram-Modification

A Framework to Reversible Data Hiding Using Histogram-Modification A Framework to Reversible Data Hiding Using Histogram-Modification R. Neeraja 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:r.p.neeru@gmail.com M. Gnana Priya

More information

An Adaptive Subdivision Method Based on Limit Surface Normal

An Adaptive Subdivision Method Based on Limit Surface Normal An Adaptive Subdivision Method Based on Limit Surface Normal Zhongxian Chen, Xiaonan Luo, Ruotian Ling Computer Application Institute Sun Yat-sen University, Guangzhou, China lnslxn@mail.sysu.edu.cn Abstract

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

Robust color segmentation algorithms in illumination variation conditions

Robust color segmentation algorithms in illumination variation conditions 286 CHINESE OPTICS LETTERS / Vol. 8, No. / March 10, 2010 Robust color segmentation algorithms in illumination variation conditions Jinhui Lan ( ) and Kai Shen ( Department of Measurement and Control Technologies,

More information

Speech Modulation for Image Watermarking

Speech Modulation for Image Watermarking Speech Modulation for Image Watermarking Mourad Talbi 1, Ben Fatima Sira 2 1 Center of Researches and Technologies of Energy, Tunisia 2 Engineering School of Tunis, Tunisia Abstract Embedding a hidden

More information

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute

More information

Research on QR Code Image Pre-processing Algorithm under Complex Background

Research on QR Code Image Pre-processing Algorithm under Complex Background Scientific Journal of Information Engineering May 207, Volume 7, Issue, PP.-7 Research on QR Code Image Pre-processing Algorithm under Complex Background Lei Liu, Lin-li Zhou, Huifang Bao. Institute of

More information

A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya

A New Algorithm for QR Code Watermarking Technique For Digital Images Using Wavelet Transformation Alikani Vijaya Durga, S Srividya www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7776-7782 A New Algorithm for QR Code Watermarking Technique For Digital

More information

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility An Information Hiding Scheme Based on Pixel- Value-Ordering Prediction-Error Expansion with Reversibility Ching-Chiuan Lin Department of Information Management Overseas Chinese University Taichung, Taiwan

More information

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014 Comparison of Digital Image Watermarking Algorithms Xu Zhou Colorado School of Mines December 1, 2014 Outlier Introduction Background on digital image watermarking Comparison of several algorithms Experimental

More information

IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc

IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc 0th European Signal Processing Conference (EUSIPCO 01) Bucharest, Romania, August 7-31, 01 IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION Catalin Dragoi, Dinu Coltuc

More information

Open Access Compression Algorithm of 3D Point Cloud Data Based on Octree

Open Access Compression Algorithm of 3D Point Cloud Data Based on Octree Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 879-883 879 Open Access Compression Algorithm of 3D Point Cloud Data Based on Octree Dai

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

Research Article Quadratic Error Metric Mesh Simplification Algorithm Based on Discrete Curvature

Research Article Quadratic Error Metric Mesh Simplification Algorithm Based on Discrete Curvature Mathematical Problems in Engineering Volume 2015, Article ID 428917, 7 pages http://dx.doi.org/10.1155/2015/428917 Research Article Quadratic Error Metric Mesh Simplification Algorithm Based on Discrete

More information

Subpixel Corner Detection Using Spatial Moment 1)

Subpixel Corner Detection Using Spatial Moment 1) Vol.31, No.5 ACTA AUTOMATICA SINICA September, 25 Subpixel Corner Detection Using Spatial Moment 1) WANG She-Yang SONG Shen-Min QIANG Wen-Yi CHEN Xing-Lin (Department of Control Engineering, Harbin Institute

More information

Half-edge Collapse Simplification Algorithm Based on Angle Feature

Half-edge Collapse Simplification Algorithm Based on Angle Feature International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) Half-edge Collapse Simplification Algorithm Based on Angle Feature 1,2 JunFeng Li, 2 YongBo Chen, 3

More information

Block-based Watermarking Using Random Position Key

Block-based Watermarking Using Random Position Key IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.2, February 2009 83 Block-based Watermarking Using Random Position Key Won-Jei Kim, Jong-Keuk Lee, Ji-Hong Kim, and Ki-Ryong

More information

An efficient face recognition algorithm based on multi-kernel regularization learning

An efficient face recognition algorithm based on multi-kernel regularization learning Acta Technica 61, No. 4A/2016, 75 84 c 2017 Institute of Thermomechanics CAS, v.v.i. An efficient face recognition algorithm based on multi-kernel regularization learning Bi Rongrong 1 Abstract. A novel

More information

An Efficient Data Structure for Representing Trilateral/Quadrilateral Subdivision Surfaces

An Efficient Data Structure for Representing Trilateral/Quadrilateral Subdivision Surfaces BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 3, No 3 Sofia 203 Print ISSN: 3-9702; Online ISSN: 34-408 DOI: 0.2478/cait-203-0023 An Efficient Data Structure for Representing

More information

Watermarking Moble Phone Color Images With Error Correction Codes

Watermarking Moble Phone Color Images With Error Correction Codes IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 05-09 www.iosrjournals.org Watermarking Moble Phone Color Images With Error Correction Codes

More information

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION D. AMBIKA *, Research Scholar, Department of Computer Science, Avinashilingam Institute

More information

A Robust Watermarking Algorithm For JPEG Images

A Robust Watermarking Algorithm For JPEG Images nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 7) A Robust Watermarking Algorithm For JPEG Images Baosheng Sun, Daofu Gong*, Fenlin Liu *Foundation

More information

OPTIMIZED MULTIPLE DESCRIPTION SCALAR QUANTIZATION BASED 3D MESH CODING

OPTIMIZED MULTIPLE DESCRIPTION SCALAR QUANTIZATION BASED 3D MESH CODING OPTIMIZED MULTIPLE DESCRIPTION SCALAR QUANTIZATION BASED 3D MESH CODING M. Oguz Bici 1, Gozde Bozdagi Akar 1, Andrey Norkin 2 and Atanas Gotchev 2 1 Middle East Technical University, Ankara, Turkey 2 Department

More information

ing and enhancing operations for shapes represented by level sets (isosurfaces) and applied unsharp masking to the level set normals. Their approach t

ing and enhancing operations for shapes represented by level sets (isosurfaces) and applied unsharp masking to the level set normals. Their approach t Shape Deblurring with Unsharp Masking Applied to Mesh Normals Hirokazu Yagou Λ Alexander Belyaev y Daming Wei z Λ y z ; ; Shape Modeling Laboratory, University of Aizu, Aizu-Wakamatsu 965-8580 Japan fm50534,

More information

arxiv: v1 [cs.cr] 31 Dec 2018

arxiv: v1 [cs.cr] 31 Dec 2018 Security analysis of a self-embedding fragile image watermark scheme Xinhui Gong, Feng Yu, Xiaohong Zhao, Shihong Wang School of Science, Beijing University of Posts and Telecommunications, Beijing 100876,

More information

Performance Analysis of Discrete Wavelet Transform based Audio Watermarking on Indian Classical Songs

Performance Analysis of Discrete Wavelet Transform based Audio Watermarking on Indian Classical Songs Volume 73 No.6, July 2013 Performance Analysis of Discrete Wavelet Transform based Audio ing on Indian Classical Songs C. M. Juli Janardhanan Department of ECE Government Engineering College, Wayanad Mananthavady,

More information

Image retrieval based on region shape similarity

Image retrieval based on region shape similarity Image retrieval based on region shape similarity Cheng Chang Liu Wenyin Hongjiang Zhang Microsoft Research China, 49 Zhichun Road, Beijing 8, China {wyliu, hjzhang}@microsoft.com ABSTRACT This paper presents

More information

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL

SPREAD SPECTRUM AUDIO WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL SPREAD SPECTRUM WATERMARKING SCHEME BASED ON PSYCHOACOUSTIC MODEL 1 Yüksel Tokur 2 Ergun Erçelebi e-mail: tokur@gantep.edu.tr e-mail: ercelebi@gantep.edu.tr 1 Gaziantep University, MYO, 27310, Gaziantep,

More information

Point-based Simplification Algorithm

Point-based Simplification Algorithm Point-based Simplification Algorithm Pai-Feng Lee 1, Bin-Shyan Jong 2 Department of Information Management, Hsing Wu College 1 Dept. of Information and Computer Engineering Engineering, Chung Yuan Christian

More information

Data Hiding in Video

Data Hiding in Video Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract

More information

A blind Wavelet-Based Digital Watermarking for Video

A blind Wavelet-Based Digital Watermarking for Video International Journal of Video & Image Processing and Network Security IJVIPNS Vol: 9 No: 9-471 - A blind Wavelet-Based Digital Watermarking for Video A.Essaouabi and F.Regragui Department of physics,

More information

AUTHENTICATION SYSTEM USING IRIS RECOGNITION

AUTHENTICATION SYSTEM USING IRIS RECOGNITION AUTHENTICATION SYSTEM USING IRIS RECOGNITION A. Shruti Kambli; B. Ankita Malap; C. Punam Naik; D. Pooja Tupe; E. Dr. (Mrs.) Saylee Gharge Abstract Biometric system provides automatic identification of

More information

Near-Optimum Adaptive Tessellation of General Catmull-Clark Subdivision Surfaces

Near-Optimum Adaptive Tessellation of General Catmull-Clark Subdivision Surfaces Near-Optimum Adaptive Tessellation of General Catmull-Clark Subdivision Surfaces Shuhua Lai and Fuhua (Frank) Cheng (University of Kentucky) Graphics & Geometric Modeling Lab, Department of Computer Science,

More information

A Data Classification Algorithm of Internet of Things Based on Neural Network

A Data Classification Algorithm of Internet of Things Based on Neural Network A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To

More information

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Video Inter-frame Forgery Identification Based on Optical Flow Consistency Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong

More information

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD

Digital Image Watermarking using Fuzzy Logic approach based on DWT and SVD Digital Watermarking using Fuzzy Logic approach based on DWT and SVD T.Sridevi Associate Professor CBIT Hyderabad,India S Sameena Fatima,Ph.D Professor, OU, Hyderabad,India ABSTRACT Digital image watermarking

More information

Multiresolution Remeshing Using Weighted Centroidal Voronoi Diagram

Multiresolution Remeshing Using Weighted Centroidal Voronoi Diagram Multiresolution Remeshing Using Weighted Centroidal Voronoi Diagram Chao-Hung Lin 1, Chung-Ren Yan 2, Ji-Hsen Hsu 2, and Tong-Yee Lee 2 1 Dept. of Geomatics, National Cheng Kung University, Taiwan 2 Dept.

More information

Secured Watermarking in DCT Domain using CRT and Complexity Analysis

Secured Watermarking in DCT Domain using CRT and Complexity Analysis Secured Watermarking in DCT Domain using CRT and Complexity Analysis Varun Kumar Department of Electronics & Communication Engg Om Institute of Technology and Management, HISAR-125001, INDIA Kuldeep Bhardwaj

More information

SHAPE SEGMENTATION FOR SHAPE DESCRIPTION

SHAPE SEGMENTATION FOR SHAPE DESCRIPTION SHAPE SEGMENTATION FOR SHAPE DESCRIPTION Olga Symonova GraphiTech Salita dei Molini 2, Villazzano (TN), Italy olga.symonova@graphitech.it Raffaele De Amicis GraphiTech Salita dei Molini 2, Villazzano (TN),

More information

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and

More information

Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds

Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds 9 1th International Conference on Document Analysis and Recognition Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds Weihan Sun, Koichi Kise Graduate School

More information

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Comparison of Wavelet Based Watermarking Techniques for Various Attacks International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-3, Issue-4, April 2015 Comparison of Wavelet Based Watermarking Techniques for Various Attacks Sachin B. Patel,

More information

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor

More information

An Improved Blind Watermarking Scheme in Wavelet Domain

An Improved Blind Watermarking Scheme in Wavelet Domain An Improved Blind Watermarking Scheme in Wavelet Domain Hai Tao 1, Jasni Mohamad Zain 1, Ahmed N. Abd Alla 2, Wang Jing 1 1 Faculty of Computer Systems and Software Engineering University Malaysia Pahang

More information

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION Ghulam Muhammad*,1, Muhammad Hussain 2, Anwar M. Mirza 1, and George Bebis 3 1 Department of Computer Engineering, 2 Department of

More information

Spectral Compression of Mesh Geometry

Spectral Compression of Mesh Geometry Spectral Compression of Mesh Geometry Zachi Karni, Craig Gotsman SIGGRAPH 2000 1 Introduction Thus far, topology coding drove geometry coding. Geometric data contains far more information (15 vs. 3 bits/vertex).

More information